Author of the publication

Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.

, , , , , and . PRDC, page 125-134. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Game-Theoretic Approach to Respond to Attacker Lateral Movement., , , and . GameSec, volume 9996 of Lecture Notes in Computer Science, page 294-313. Springer, (2016)PowerAlert: An Integrity Checker using Power Measurement., , and . CoRR, (2017)Model Checking Software with First Order Logic Specifications Using AIG Solvers., and . IEEE Trans. Software Eng., 42 (8): 741-763 (2016)Accounting for the Human User in Predictive Security Models., , , , and . PRDC, page 329-338. IEEE Computer Society, (2017)Achieving network resiliency using sound theoretical and practical methods. University of Illinois Urbana-Champaign, USA, (2020)Revisiting Client Puzzles for State Exhaustion Attacks Resilience., , , , , , and . DSN, page 617-629. IEEE, (2019)An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement., , , and . SRDS, page 224-233. IEEE Computer Society, (2017)Quantitative security metrics with human in the loop., , , and . HotSoS, page 21:1-21:2. ACM, (2015)OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis., , , and . NDSS, The Internet Society, (2020)P4AIG: Circuit-Level Verification of P4 Programs., , , , and . DSN (Supplements), page 21-22. IEEE, (2019)